-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document how to store passwords in .irodsA
file
#596
Comments
I think it's already documented here in the list item that describes the setting |
Oh, I see. I was not looking for that.
If this is true, that means that iRODS native authentication cannot use this feature. Is that true? I feel like having a dedicated how-to section for this would be helpful. Or perhaps a mention of this option in the section about creating a connection (https://github.com/irods/python-irodsclient?tab=readme-ov-file#establishing-a-secure-connection) or one of the sections following that. Does that seem like a good idea? Maybe what we have is enough... |
A new section makes sense given it wasn't obvious where to look. That could be either a FAQ, Troubleshooting, or How-To section. |
Native authentication doesn't execute this particular section of code , since it's located within _login_pam(), but know that PRC does - like What would be more accurate to say regarding PAM is that PAM authentication in PRC currently needs explicit approval to overwrite .irodsA with its encoded password token, and that approval is granted by setting This all arose from trying to give the PRC some The consequence I guess is that Background: Yes, it's true PRC has long had the capability of authenticating through PAM, but until that recent release it wasn't using stored .irodsA data or persisting such data back into .irodsA for the next PAM session when the current password was found to have expired. Rather, PRC was actually authenticating each new session by generating the login tokens anew, via calling the PAM api instead of respecting what iinit might have stored in .irodsA. Examine the Whereas the iCommands' methodology was always to read out the PAM token that existed already in |
There's now a commit in pr #620 documenting how users may employ PRC in place of It isn't clear to me which route to go, in furnishing the If so, how do we prefer to proceed?
|
Providing a free function feels the most correct and enables flexibility. I don't think the PRC should automatically write any files due to its design. That feels like a decision the user/dev should make. It's also not clear when the PRC would write that file. |
Adding this as a discussion item. |
… native authentication. This commit introduces iinit-like capability to generate the .irodsA file, when not previously existing, for the pam_password authentication scheme. Also, free functions are introduced which create the .irodsA file from a cleartext password value in the native and pam_password authentication schemes.
…ication. This commit introduces iinit-like capability to generate the .irodsA file, when not previously existing, for the pam_password authentication scheme. Also, free functions are introduced which create the .irodsA file from a cleartext password value in the native and pam_password authentication schemes.
It seems this is possible:
python-irodsclient/irods/connection.py
Lines 532 to 536 in 067e63d
However, this is not documented anywhere, and it's not clear (at least to me) whether this option is available outside of PAM authentication (this code is under
_pam_login
) or how to use it. Let's add documentation around how this works and how to use it.The text was updated successfully, but these errors were encountered: